Best infosec-related long reads for the week of 10/18/25
metacurity.com·2d
🛡Cybersecurity
Flag this post
How the CIA’s Kryptos Sculpture Gave Up Its Final Secret
scientificamerican.com·5d
🔐Cryptographic Archaeology
Flag this post
Shadow IT: The Haunting Inside Your Network
bitsight.com·4d
🔓Hacking
Flag this post
Beyond Benchmarks: Testing Open-Source LLMs in Multi-Agent Workflows
blog.scottlogic.com·22h
⚡Performance Mythology
Flag this post
AI Parsing of Commercial Proposals: How to Accelerate Proposal Processing and Win Clients
hackernoon.com·13h
🌀Brotli Internals
Flag this post
Hacking Team successor linked to malware campaign, new ‘Dante’ commercial spyware
cyberscoop.com·5h
🎫Kerberos Exploitation
Flag this post
Hiding Processes from Ps or Top
📟Terminal Forensics
Flag this post
Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked
🔓Password Cracking
Flag this post
Automated Anomaly Detection in Cryo-EM Density Maps via Multi-Scale Fourier Analysis and Bayesian Calibration
📄Document Digitization
Flag this post
CXRAgent: Director-Orchestrated Multi-Stage Reasoning for Chest X-Ray Interpretation
arxiv.org·18h
⚡Proof Automation
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·18h
🧮Algebraic Datatypes
Flag this post
Excision Score: Evaluating Edits with Surgical Precision
arxiv.org·18h
⛏️File Carving
Flag this post
11 problems I have noticed building Agents (and fixes nobody talks about)
⚡Proof Automation
Flag this post
Remember Your First Time (in Philosophy)?
cacm.acm.org·1h
🧮Theoretical Computer Science
Flag this post
Eight Steps to Digital Sovereignty
heise.de·1d
🖥️Self-hosted Infrastructure
Flag this post
TokenCLIP: Token-wise Prompt Learning for Zero-shot Anomaly Detection
arxiv.org·18h
🗜️LZW Variants
Flag this post
Morphologically Intelligent Perturbation Prediction with FORM
arxiv.org·18h
🌀Differential Geometry
Flag this post
Loading...Loading more...